📊 Analyze and document the unpacking of Dridex malware, showcasing techniques for memory forensics and PE reconstruction in a secure lab setting.
-
Updated
Nov 12, 2025
📊 Analyze and document the unpacking of Dridex malware, showcasing techniques for memory forensics and PE reconstruction in a secure lab setting.
Parsing and re-packing Android boot.img/vbmeta.img/payload.bin, supporting Android 15
A simple extraction tool for unpacking Operation Flashpoint's game files. Works for both Dragon Rising and Red River.
A sophisticated memory analysis library that extracts DEX files from running Android applications without requiring root access.
A packer/unpacker for Apple Keynote presentation files.
This repository contains a detailed technical report documenting the unpacking process of a Dridex malware sample. The analysis was performed in a controlled virtualized environment using x32dbg, Process Hacker, and PE-bear to locate, extract, and partially reconstruct PE images from memory.
Deobfuscate obfuscator.io, unminify and unpack bundled javascript
Add a description, image, and links to the unpack topic page so that developers can more easily learn about it.
To associate your repository with the unpack topic, visit your repo's landing page and select "manage topics."